بدائل البحث:
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
making algorithm » cosine algorithm (توسيع البحث)
data algorithm » jaya algorithm (توسيع البحث), deer algorithm (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), rd algorithm (توسيع البحث), colony algorithm (توسيع البحث)
-
61
Molecular Classification of Breast Cancer Utilizing Long Non-Coding RNA (lncRNA) Transcriptomes Identifies Novel Diagnostic lncRNA Panel for Triple-Negative Breast Cancer
منشور في 2021"…The identification of long non-coding RNAs (lncRNAs) and the roles they play in cancer progression has recently proven to be beneficial. …"
-
62
New Hardware Algorithms and Designs for Montgomery Modular Inverse Computation in Galois Fields GF(p) and GF(2n)
منشور في 2002"…We compare all scalable designs with fully parallel ones based on the same basic inversion algorithm. All scalable designs consumed less area and in general showed better performance than the fully parallel ones, which makes the scalable design a very efficient solution for computing the long precision Montgomery inverse.…"
احصل على النص الكامل
احصل على النص الكامل
masterThesis -
63
Logistics Optimization Using Hybrid Genetic Algorithm (HGA): A Solution to the Vehicle Routing Problem With Time Windows (VRPTW)
منشور في 2024"…Experimental findings validate that HGA-SIH consistently delivers results on par with or surpasses those obtained by several cutting-edge algorithms when evaluated based on various solution quality metrics. …"
-
64
Random Forest Bagging and X‐Means Clustered Antipattern Detection from SQL Query Log for Accessing Secure Mobile Data
منشور في 2021"…<p dir="ltr">In the current ongoing crisis, people mostly rely on mobile phones for all the activities, but query analysis and mobile data security are major issues. Several research works have been made on efficient detection of antipatterns for minimizing the complexity of query analysis. …"
-
65
-
66
-
67
Federated Transfer Learning for Authentication and Privacy Preservation Using Novel Supportive Twin Delayed DDPG (S-TD3) Algorithm for IIoT
منشور في 2021"…Additionally, by introducing the authentication mechanism based on transfer learning, blockchains can enhance the preservation and security standards for industrial applications. …"
-
68
Improvement of Kernel Principal Component Analysis-Based Approach for Nonlinear Process Monitoring by Data Set Size Reduction Using Class Interval
منشور في 2024"…In this paper, the proposed algorithm selects relevant observations from the original data set by utilizing a class interval technique (i.e. histogram) to maintain a bunch of representative samples from each bin. …"
-
69
Reinforced steering Evolutionary Markov Chain for high-dimensional feature selection
منشور في 2024"…<p>The increasing accessibility of extensive datasets has amplified the importance of extracting insights from high-dimensional data. However, the task of selecting relevant features in these high-dimensional spaces is made more difficult due to the curse of dimensionality. …"
-
70
-
71
Improving Rule Set Based Software Quality Prediction
منشور في 2003احصل على النص الكامل
احصل على النص الكامل
article -
72
Multi Self-Organizing Map (SOM) Pipeline Architecture for Multi-View Clustering
منشور في 2024"…It calculates the dimension relevance with various data instances. These further place the relevant dimension samples in one group. …"
-
73
An Ontology-based Semantic Web for Arabic Question Answering: The Case of E-Government Services
منشور في 2018"…Further, 414 automatic questions are tested on the QA algorithm using two methods, semantics-based and keyword-based. …"
احصل على النص الكامل
-
74
Learning-Based Spectrum Sensing and Access for Cognitive Radio Systems
منشور في 2015احصل على النص الكامل
doctoralThesis -
75
A Novel Steganography Technique for Digital Images Using the Least Significant Bit Substitution Method
منشور في 2022"…The LSB substitution method can minimize the error rate in embedding process and can achieve greater reliability in criteria, using novel algorithm based on value difference. In this paper, we proposed a novel technique in steganography within the digital images such is RGB, Gray Scale, Texture, Aerial images to achieve higher security, imperceptibility, capacity, and robustness as compared with existing methods. …"
-
76
Privacy-Preserving Framework for Blockchain-Based Stock Exchange Platform
منشور في 2022"…Furthermore, to assess the overhead of the proposed privacy algorithms on the trading execution time, we conduct several experiments considering different anonymity levels <i>k</i> . …"
-
77
Practical Multiple Node Failure Recovery in Distributed Storage Systems
منشور في 2016"…The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an outer maximum distance separable (MDS) code and an inner fractional repetition code that splits the data into several blocks and stores multiple replicas of each on different nodes in the system. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
78
A Hybrid Deep Learning Model Using CNN and K-Mean Clustering for Energy Efficient Modelling in Mobile EdgeIoT
منشور في 2023"…This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified k-mean clustering (MKM) method for MEC. …"
-
79
Simple and effective neural-free soft-cluster embeddings for item cold-start recommendations
منشور في 2022"…The best available recommendation algorithms are based on using the observed preference information among collaborating entities. …"
-
80
FPGA-Based Network Traffic Classification Using Machine Learning
منشور في 2019احصل على النص الكامل
doctoralThesis